Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (122)
  • Open Access

    ARTICLE

    ResCD-FCN: Semantic Scene Change Detection Using Deep Neural Networks

    S. Eliza Femi Sherley1,*, J. M. Karthikeyan1, N. Bharath Raj1, R. Prabakaran2, A. Abinaya1, S. V. V. Lakshmi3

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 215-227, 2022, DOI:10.32604/jai.2022.034931

    Abstract Semantic change detection is extension of change detection task in which it is not only used to identify the changed regions but also to analyze the land area semantic (labels/categories) details before and after the timelines are analyzed. Periodical land change analysis is used for many real time applications for valuation purposes. Majority of the research works are focused on Convolutional Neural Networks (CNN) which tries to analyze changes alone. Semantic information of changes appears to be missing, there by absence of communication between the different semantic timelines and changes detected over the region happens. To overcome this limitation, a… More >

  • Open Access

    ARTICLE

    Energy Efficient Hyperparameter Tuned Deep Neural Network to Improve Accuracy of Near-Threshold Processor

    K. Chanthirasekaran, Raghu Gundaala*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 471-489, 2023, DOI:10.32604/iasc.2023.036130

    Abstract When it comes to decreasing margins and increasing energy efficiency in near-threshold and sub-threshold processors, timing error resilience may be viewed as a potentially lucrative alternative to examine. On the other hand, the currently employed approaches have certain restrictions, including high levels of design complexity, severe time constraints on error consolidation and propagation, and uncontaminated architectural registers (ARs). The design of near-threshold circuits, often known as NT circuits, is becoming the approach of choice for the construction of energy-efficient digital circuits. As a result of the exponentially decreased driving current, there was a reduction in performance, which was one of… More >

  • Open Access

    ARTICLE

    CNN-LSTM: A Novel Hybrid Deep Neural Network Model for Brain Tumor Classification

    R. D. Dhaniya1, K. M. Umamaheswari2,*

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1129-1143, 2023, DOI:10.32604/iasc.2023.035905

    Abstract Current revelations in medical imaging have seen a slew of computer-aided diagnostic (CAD) tools for radiologists developed. Brain tumor classification is essential for radiologists to fully support and better interpret magnetic resonance imaging (MRI). In this work, we reported on new observations based on binary brain tumor categorization using HYBRID CNN-LSTM. Initially, the collected image is pre-processed and augmented using the following steps such as rotation, cropping, zooming, CLAHE (Contrast Limited Adaptive Histogram Equalization), and Random Rotation with panoramic stitching (RRPS). Then, a method called particle swarm optimization (PSO) is used to segment tumor regions in an MR image. After… More >

  • Open Access

    ARTICLE

    A Progressive Approach to Generic Object Detection: A Two-Stage Framework for Image Recognition

    Muhammad Aamir1, Ziaur Rahman1,*, Waheed Ahmed Abro2, Uzair Aslam Bhatti3, Zaheer Ahmed Dayo1, Muhammad Ishfaq1

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6351-6373, 2023, DOI:10.32604/cmc.2023.038173

    Abstract Object detection in images has been identified as a critical area of research in computer vision image processing. Research has developed several novel methods for determining an object’s location and category from an image. However, there is still room for improvement in terms of detection efficiency. This study aims to develop a technique for detecting objects in images. To enhance overall detection performance, we considered object detection a two-fold problem, including localization and classification. The proposed method generates class-independent, high-quality, and precise proposals using an agglomerative clustering technique. We then combine these proposals with the relevant input image to train… More >

  • Open Access

    REVIEW

    A Survey on Artificial Intelligence in Posture Recognition

    Xiaoyan Jiang1,2, Zuojin Hu1, Shuihua Wang2, Yudong Zhang2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 35-82, 2023, DOI:10.32604/cmes.2023.027676

    Abstract Over the years, the continuous development of new technology has promoted research in the field of posture recognition and also made the application field of posture recognition have been greatly expanded. The purpose of this paper is to introduce the latest methods of posture recognition and review the various techniques and algorithms of posture recognition in recent years, such as scale-invariant feature transform, histogram of oriented gradients, support vector machine (SVM), Gaussian mixture model, dynamic time warping, hidden Markov model (HMM), lightweight network, convolutional neural network (CNN). We also investigate improved methods of CNN, such as stacked hourglass networks, multi-stage… More >

  • Open Access

    ARTICLE

    A Data Driven Security Correction Method for Power Systems with UPFC

    Qun Li, Ningyu Zhang*, Jianhua Zhou, Xinyao Zhu, Peng Li

    Energy Engineering, Vol.120, No.6, pp. 1485-1502, 2023, DOI:10.32604/ee.2023.022856

    Abstract The access of unified power flow controllers (UPFC) has changed the structure and operation mode of power grids all across the world, and it has brought severe challenges to the traditional real-time calculation of security correction based on traditional models. Considering the limitation of computational efficiency regarding complex, physical models, a data-driven power system security correction method with UPFC is, in this paper, proposed. Based on the complex mapping relationship between the operation state data and the security correction strategy, a two-stage deep neural network (DNN) learning framework is proposed, which divides the offline training task of security correction into… More >

  • Open Access

    ARTICLE

    Hyperparameter Tuning for Deep Neural Networks Based Optimization Algorithm

    D. Vidyabharathi1,*, V. Mohanraj2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2559-2573, 2023, DOI:10.32604/iasc.2023.032255

    Abstract For training the present Neural Network (NN) models, the standard technique is to utilize decaying Learning Rates (LR). While the majority of these techniques commence with a large LR, they will decay multiple times over time. Decaying has been proved to enhance generalization as well as optimization. Other parameters, such as the network’s size, the number of hidden layers, dropouts to avoid overfitting, batch size, and so on, are solely based on heuristics. This work has proposed Adaptive Teaching Learning Based (ATLB) Heuristic to identify the optimal hyperparameters for diverse networks. Here we consider three architectures Recurrent Neural Networks (RNN),… More >

  • Open Access

    ARTICLE

    Scale Invariant Feature Transform with Crow Optimization for Breast Cancer Detection

    A. Selvi*, S. Thilagamani

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2973-2987, 2023, DOI:10.32604/iasc.2022.029850

    Abstract Mammography is considered a significant image for accurate breast cancer detection. Content-based image retrieval (CBIR) contributes to classifying the query mammography image and retrieves similar mammographic images from the database. This CBIR system helps a physician to give better treatment. Local features must be described with the input images to retrieve similar images. Existing methods are inefficient and inaccurate by failing in local features analysis. Hence, efficient digital mammography image retrieval needs to be implemented. This paper proposed reliable recovery of the mammographic image from the database, which requires the removal of noise using Kalman filter and scale-invariant feature transform… More >

  • Open Access

    ARTICLE

    Adaptive Backdoor Attack against Deep Neural Networks

    Honglu He, Zhiying Zhu, Xinpeng Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2617-2633, 2023, DOI:10.32604/cmes.2023.025923

    Abstract In recent years, the number of parameters of deep neural networks (DNNs) has been increasing rapidly. The training of DNNs is typically computation-intensive. As a result, many users leverage cloud computing and outsource their training procedures. Outsourcing computation results in a potential risk called backdoor attack, in which a welltrained DNN would perform abnormally on inputs with a certain trigger. Backdoor attacks can also be classified as attacks that exploit fake images. However, most backdoor attacks design a uniform trigger for all images, which can be easily detected and removed. In this paper, we propose a novel adaptive backdoor attack.… More >

  • Open Access

    ARTICLE

    Adversarial Examples Protect Your Privacy on Speech Enhancement System

    Mingyu Dong, Diqun Yan*, Rangding Wang

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1-12, 2023, DOI:10.32604/csse.2023.034568

    Abstract Speech is easily leaked imperceptibly. When people use their phones, the personal voice assistant is constantly listening and waiting to be activated. Private content in speech may be maliciously extracted through automatic speech recognition (ASR) technology by some applications on phone devices. To guarantee that the recognized speech content is accurate, speech enhancement technology is used to denoise the input speech. Speech enhancement technology has developed rapidly along with deep neural networks (DNNs), but adversarial examples can cause DNNs to fail. Considering that the vulnerability of DNN can be used to protect the privacy in speech. In this work, we… More >

Displaying 1-10 on page 1 of 122. Per Page  

Share Link